Open Access iconOpen Access

ARTICLE

crossmark

Secured Medical Data Transfer Using Reverse Data Hiding System Through Steganography

S. Aiswarya*, R. Gomathi

Department of Electronics and Communication Engineering, University College of Engineering, Dindigul, 624709, Tamilnadu, India

* Corresponding Author: S. Aiswarya. Email: email

Intelligent Automation & Soft Computing 2022, 34(2), 969-982. https://doi.org/10.32604/iasc.2022.025475

Abstract

Reversible Data Hiding (RDH) is the process of transferring secret data hidden inside cover media to the recipient so the recipient can securely retrieve both the secret data and cover media. The RDH approach is applied in this study in the field of telemedicine, and medical-secret data is conveyed privately via medical cover video. Morse code-based data encryption technique tends to encrypt the medical-secret data by compression using the Arithmetic coding technique. Discrete Shearlet transform (DST) compresses the selected frame from the medical cover video and the compressed secret data is embedded into the compressed frame using logical operations. On a receiver side, the reversal process is carried over and the original cover frame will be retrieved from the stego frame after secret medical data is retrieved. Password is included on the receiver side for authentication purposes. Parameters such as encryption time, compression ratio, Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR) are calculated and at the maximum iteration of the proposed algorithm, the highest PSNR value is achieved. In terms of Structural Similarity Index Measure (SSIM), a linear increase from 0.91 to 0.99 is evident for iterations. In comparison with other techniques, the proposed algorithm reaches a higher SSIM of 0.999 after the maximum number of iterations. Thus, the proposed method provides more security and authentication to the recipient.

Keywords


Cite This Article

S. Aiswarya and R. Gomathi, "Secured medical data transfer using reverse data hiding system through steganography," Intelligent Automation & Soft Computing, vol. 34, no.2, pp. 969–982, 2022.



cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1018

    View

  • 548

    Download

  • 0

    Like

Share Link